General
-
Target
nrwncpwo.ps1
-
Size
350B
-
Sample
240320-qf2vgsaa2y
-
MD5
4dcabdc088c563712db30a16ed19dd52
-
SHA1
5758984a8840f3af5624e1149b306e8efd9ae483
-
SHA256
9353635f565f1a3b0c4caa28f268f30271e12709d921ea87969cd4e7d2b8c642
-
SHA512
a84614600f27918ac5490360873128bf6a7b6a8181efc64608b1045913a9ddd27f18e1b3d175e68e2f64d221a08fd160b122a0e4f5540e5bb828c5be9a60e40f
Static task
static1
Behavioral task
behavioral1
Sample
nrwncpwo.ps1
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
nrwncpwo.ps1
Resource
win10v2004-20231215-en
Malware Config
Extracted
darkgate
admin888
badbutperfect.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
WZqqpfdY
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
nrwncpwo.ps1
-
Size
350B
-
MD5
4dcabdc088c563712db30a16ed19dd52
-
SHA1
5758984a8840f3af5624e1149b306e8efd9ae483
-
SHA256
9353635f565f1a3b0c4caa28f268f30271e12709d921ea87969cd4e7d2b8c642
-
SHA512
a84614600f27918ac5490360873128bf6a7b6a8181efc64608b1045913a9ddd27f18e1b3d175e68e2f64d221a08fd160b122a0e4f5540e5bb828c5be9a60e40f
-
Detect DarkGate stealer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-